General
-
Target
BootStrapper.exe
-
Size
2.9MB
-
Sample
250303-yklm3axks3
-
MD5
8828ce17966882f2e7ea3c2b81784b5e
-
SHA1
6c9f94b8caf056559a1d369afb79c15352437cba
-
SHA256
d07347612a8c2a0251dff5d9e0dd0cfbd525c420c8b6da1811737d7823332e3c
-
SHA512
d1deb6b1bb5fef47ba9a59d0c787bc76c8f623e5b5b7b510353189c29f1272f2434abb0af01428d323784107a4485ad1f4522e40c0dc604d6c4e6b64c6866c7c
-
SSDEEP
49152:xEUytQiBSHhKt8zXa1qH2L878d4Nmmev3Hsw1e27ACRIoHmEY3YZuhoo:CNtQlHh3X/2L/RmOswzAe+E/u9
Static task
static1
Behavioral task
behavioral1
Sample
BootStrapper.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
xworm
-
Install_directory
%AppData%
-
install_file
Sihost.exe
-
pastebin_url
https://pastebin.com/raw/hA5YVNf1
Targets
-
-
Target
BootStrapper.exe
-
Size
2.9MB
-
MD5
8828ce17966882f2e7ea3c2b81784b5e
-
SHA1
6c9f94b8caf056559a1d369afb79c15352437cba
-
SHA256
d07347612a8c2a0251dff5d9e0dd0cfbd525c420c8b6da1811737d7823332e3c
-
SHA512
d1deb6b1bb5fef47ba9a59d0c787bc76c8f623e5b5b7b510353189c29f1272f2434abb0af01428d323784107a4485ad1f4522e40c0dc604d6c4e6b64c6866c7c
-
SSDEEP
49152:xEUytQiBSHhKt8zXa1qH2L878d4Nmmev3Hsw1e27ACRIoHmEY3YZuhoo:CNtQlHh3X/2L/RmOswzAe+E/u9
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-